CN110188530A - A kind of safety certifying method, device, equipment and readable storage medium storing program for executing - Google Patents
A kind of safety certifying method, device, equipment and readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN110188530A CN110188530A CN201910463833.4A CN201910463833A CN110188530A CN 110188530 A CN110188530 A CN 110188530A CN 201910463833 A CN201910463833 A CN 201910463833A CN 110188530 A CN110188530 A CN 110188530A
- Authority
- CN
- China
- Prior art keywords
- computer system
- target computer
- safety
- authentication information
- pcr16
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
Abstract
The invention discloses a kind of safety certifying methods, method includes the following steps: sending safe condition request to the target computer system of operating status;Receive the authentication information of target computer system feedback;Wherein, authentication information is to obtain after target computer system carries out dynamic measurement;Using the safety of authentication information verifying target computer system, security certification result is obtained.As it can be seen that this method can carry out effective safety verification to object-computer, it is reliable and secure for further can ensure that target computer system under operation when target computer system is run.The invention also discloses a kind of safety certification device, equipment and readable storage medium storing program for executing, have corresponding technical effect.
Description
Technical field
The present invention relates to computer application technology, more particularly to a kind of safety certifying method, device, equipment and can
Read storage medium.
Background technique
Current social information technology is maked rapid progress, and internet has been socially reintegrated the every aspect of life.Internet is to people
While offer convenience, stern challenge is also brought for computer system security.In addition to external attacks such as internet worms, dislike
Meaning administrator etc. internal attack system can also be caused safely it is potentially hazardous.
How fundamentally timely discovery system safety is distorted important as information security by external attack and malice
Goal in research.Trusted Computing Group (Trusted Computing Group) proposes to utilize reliable computing technology, with TPM chip
For root of trust, it is based on transitive trust technology, in the booting operating system stage, constructs trust computing system to protect the peace of system
Entirely.This method can ensure BIOS, MBR, BootLoader using staticametric technology, and OS Kernel is in os starting
Hardware, firmware and O/S kernel are reliable and secure in the process.But after os starting, transitive trust process terminates.By
In trust chain system start after, the transmittance process of trust chain just finishes, thus computer system operation when, just without
Method effectively verifies the safety of computer system based on trust chain.And computer system is at runtime, malicious attack meeting
It causes damages safely to system.
In conclusion the problems such as how efficiently solving safety certification when computer system operation, is current this field
Technical staff's technical problem urgently to be solved.
Summary of the invention
The object of the present invention is to provide a kind of safety certifying method, device, equipment and readable storage medium storing program for executing, in operation
The computer system of state carries out safety certification, to ensure that computer system is reliable and secure.
In order to solve the above technical problems, the invention provides the following technical scheme:
A kind of safety certifying method, comprising:
Safe condition request is sent to the target computer system of operating status;
Receive the authentication information of the target computer system feedback;Wherein, the authentication information is target calculating
It is obtained after machine system progress dynamic measurement;
The safety of the target computer system is verified using the authentication information, obtains security certification result.
Preferably, the safety that the target computer system is verified using the authentication information, comprising:
It is whether complete reliable using authentication information described in signature verification;
If it is, judging whether the authentication information matches with a reference value;
If matching, it is determined that the target computer system is in complete state;
If mismatching, it is determined that the target computer system is in non-secure states.
Preferably, after determining that the target computer system is in non-secure states, further includes:
Unsafe listed files information in the target computer system is determined using the authentication information.
Preferably, the target computer system carries out dynamic measurement, comprising:
The target computer system carries out the file in dynamic measurement listed files using dynamic measurement technology complete
Property measurement;
PCR16 metric extension is carried out to the file using TPM chip.
Preferably, it is described using TPM chip to the file carry out PCR16 metric extension after, carrying out feeding back it
Before, further includes:
It is signed using result of the TPM chip to the PCR16 metric extension.
It is preferably, described to be signed using result of the TPM chip to the PCR16 metric extension, comprising:
It is signed using result of the ECC private key in the TPM chip to the PCR16 metric extension.
Preferably, before the transmission safe condition request to the target computer system of operating status, further includes:
The safety certification registration request of the target computer system is received, and the safety certification registration request is carried out
Parsing obtains the EK public key and encrypted public key of TPM chip in the target computer system;
The EK public key and the encrypted public key are stored, and sends dynamic measurement file column to the target computer system
The a reference value of table collects request;
Receive and store a reference value of the target computer system feedback.
A kind of safety certification device, comprising:
Safe condition request sending module, for sending safe condition request to the target computer system of operating status;
Authentication information receiving module, for receiving the authentication information of the target computer system feedback;Wherein, described to recognize
The card information target computer system obtains after carrying out dynamic measurement;
Security authentication module is obtained for being verified the safety of the target computer system using the authentication information
Security certification result.
A kind of safety certificate equipment, comprising:
Memory, for storing computer program;
Processor, the step of above-mentioned safety certifying method is realized when for executing the computer program.
A kind of readable storage medium storing program for executing is stored with computer program, the computer program quilt on the readable storage medium storing program for executing
The step of processor realizes above-mentioned safety certifying method when executing.
Using method provided by the embodiment of the present invention, safe condition is sent to the target computer system of operating status and is asked
It asks;Receive the authentication information of target computer system feedback;Wherein, authentication information is that target computer system carries out dynamic measurement
It obtains afterwards;Using the safety of authentication information verifying target computer system, security certification result is obtained.In view of needing
When determining whether target computer system is safe, if target computer system itself is dangerous, target computer system is mentioned
The safe condition of confession should also be as being insecure, thus safe condition should not voluntarily be determined by target computer system.It is based on
This sends safe condition request to target computer system when target computer system is in operating status.Object-computer
After the safe condition request that system receives, dynamic measurement is carried out, and will carry out including the authentication information of dynamic measurement result anti-
Feedback.After receiving authentication information, the safety of authentication information verifying target computer system can be utilized.As it can be seen that the party
Method can carry out effective safety verification to object-computer, further can ensure that target meter when target computer system is run
Calculation machine system is reliable and secure under operation.
Correspondingly, the embodiment of the invention also provides safety certification device corresponding with above-mentioned safety certifying method, set
Standby and readable storage medium storing program for executing, has above-mentioned technique effect, and details are not described herein.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of implementation flow chart of safety certifying method in the embodiment of the present invention;
Fig. 2 is a kind of specific implementation flow chart of safety certifying method in the embodiment of the present invention;
Fig. 3 is a kind of another specific flow chart of safety certifying method in the embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of safety certification device in the embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of safety certificate equipment in the embodiment of the present invention;
Fig. 6 is a kind of concrete structure schematic diagram of safety certificate equipment in the embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, with reference to the accompanying drawings and detailed description
The present invention is described in further detail.Obviously, described embodiments are only a part of the embodiments of the present invention, rather than
Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Under every other embodiment obtained, shall fall within the protection scope of the present invention.
Embodiment one:
Referring to FIG. 1, Fig. 1 is a kind of flow chart of safety certifying method in the embodiment of the present invention, this method be can be applied to
In the equipment or platform of the non-targeted computer system at such as remote authentication center.It is below for ease of description, long-range to be applied to
It is illustrated for authentication center;Specific implementation applied to other equipment or platform can refer to and this.This method includes following
Step:
S101, safe condition request is sent to the target computer system of operating status.
When completing to start in target computer system, and entering operating status, remote authentication center can be to operating status
Target computer system send safe condition request.Wherein, in order to ensure the reliability of security certification result, will can remotely recognize
Card center is deployed in the high environment of physical isolation, security level;Target computer system can for remote authentication center into
Row registration, and remote authentication center has by verifying target computer system whether based on any one of An Quan verification information
Calculation machine system.In embodiments of the present invention, without limitation for the scale of target computer system and specific business.
Referring to FIG. 2, Fig. 2 is a kind of specific implementation flow chart of safety certifying method in the embodiment of the present invention, target meter
Calculation machine system is to be certified center in Fig. 2.It is requested sending safe condition to the target computer system of operating status
Before, registration process of the target computer system at remote authentication center, comprising:
Step 1: receiving the safety certification registration request of target computer system, and safety certification registration request is carried out
Parsing obtains the EK public key and encrypted public key of TPM chip in target computer system;
Step 2: storage EK public key and encrypted public key, and dynamic measurement listed files is sent to target computer system
A reference value collects request;
Step 3: receiving and storing a reference value of target computer system feedback.
It is illustrated for ease of description, below combining above three step.
When target computer system is registered at remote authentication center, safety certification can be sent to remote authentication center
Request, which includes the EK public key and encrypted public key of TPM chip.Wherein, the endorsement key EK of TPM chip
(Endorsement Key) is built in each TPM chip by the manufacturer of TPM chip, represents the true of each TPM chip
Identity, each TPM chip are owned by a unique EK.Specifically, the EK of TPM chip is the RSA key of 2048 bits
Right, wherein EK private key is built in TPM chip, and external entity can not obtain;EK public key can by TPM instruct obtain, externally into
Row is open.The EK of TPM chip be mostly as endorsement code key, generate individual encryption and decryption sub-key pair, with the sub-key into
Row signature.TPM chip can be generated other ECC type and (be also possible to RSA type, due to ECC class using EK as main code key
Type compares, and RSA attack tolerant is strong, encryption/decryption speed is fast, is proposed with ECC type herein) signature code key, ECC private key save
Inside TPM chip, ECC public key can be sent to remote authentication center.Remote authentication center can use ECC public key decryptions by
The information of the ECC private key signature of TPM chip, thus to guarantee that target computer system is sent to the complete of remote authentication central information
Whole property and non repudiation.
It, can be to safety certification after remote authentication center receives the safety certification registration request of target computer system transmission
Registration request carries out the EK public key and encrypted public key that parsing obtains TPM chip in target computer system.Then, EK public key is stored
And encrypted public key, such as can be by EK public key and encrypted public key storage into the information database Node_info at remote authentication center.
Request is collected to a reference value that target computer system sends dynamic measurement listed files in remote authentication center.Its
In, dynamic measurement listed files (Dynamic Measurement File List, DMFL) is when carrying out safety certification, to need
The listed files of integrality is verified, which, which can refer to, trusts the safety of computer system currently based on trust chain
When, the listed files of required verifying integrality;It can also be determined and adjust according to practical application request.Target computer system
It, can be using dynamic measurement technology to each text corresponding to dynamic measurement listed files after receiving a reference value collection request
Part carries out dynamic measurement, and feeds back to remote authentication center for dynamic measurement result as a reference value.Preferably, to each text
After part carries out dynamic measurement, PCR16 metric extension can be also carried out to dynamic measurement result (cryptographic Hash of such as each file), and will
Dynamic measurement result and PCR16 metric extension value feed back to remote validation center as a reference value.Specifically, target computer
System can the form of " filename-file cryptographic Hash and iteration cryptographic Hash-PCR16 metric extension value " return in remote authentication
The heart.
Remote authentication center receives and stores a reference value of target computer system feedback.Specifically, remote authentication center
It is " filename-Documents Metric a reference value that " filename-file cryptographic Hash and iteration cryptographic Hash-PCR16 metric extension value ", which can be stored,
With iteration cryptographic Hash-PCR16 measuring standard value " it is stored in a reference value database Node_ref.
In this way, target computer system can be completed to register at remote authentication center.
After target computer system receives safe condition request, dynamic measurement can be carried out, and measurement results are made
Remote authentication center is fed back to for authentication information.Wherein, target computer system carries out dynamic measurement, comprising: object-computer
System carries out integrity measurement to the file in dynamic measurement listed files using dynamic measurement technology;Using TPM chip to text
Part carries out PCR16 metric extension.Specifically, target computing system is using dynamic measurement technology to dynamic measurement listed files middle finger
Fixed file carries out the PCR16 metric extension of integrity measurement and TPM chip.Due to being calculated when this document is tampered
Cryptographic Hash it is inevitable inconsistent with the cryptographic Hash before being tampered, therefore the cryptographic Hash of file represents integrity information.Therefore, exist
In the embodiment of the present invention, it is specially that Hash calculation is carried out to file to integrity measurement, obtains the cryptographic Hash of this document.Dynamic Degree
Amount technology is the PCR16's of Hash calculation and TPM chip in the operating system stage respectively to the file in DMFL in real time
Metric extension.PCR16 can be extended in the operating system stage, therefore select PCR16.Metric extension value expands to
The process of PCR16 is as follows:
PCR16 [K]=Hash (PCR16 [K-1] | Hash (File_K));
Wherein, it PCR16 [K]: represents when k-th of file needs to extend in measurement list, needs to be saved in PCR16's
Value;PCR16 [K-1]: it represents before k-th of file needs to extend in measurement list, the value in original PCR16;|: it represents two
A value is spliced into a value (by two string-concatenations at a character string);Hash (File_K): the degree of k-th of file is represented
Magnitude;Hash: representing and use Hash operation, and the present invention refers in particular to SHA256;Final PCR16 stores the iteration of file in DMFL
Cryptographic Hash represents All Files integrity information in DMFL.The cryptographic Hash of each file represents each file sheet in DMFL
The integrity information of body.
It should be noted that target computer system institute after the safe condition request for receiving the transmission of remote authentication center
The realization step of the dynamic measurement of progress is identical as the dynamic measurement step carried out when being registered, can be cross-referenced.
S102, the authentication information for receiving target computer system feedback.
Wherein, authentication information is to obtain after target computer system carries out dynamic measurement.
S103, the safety of authentication information verifying target computer system, acquisition security certification result are utilized.
Preferably, in order to ensure complete and reliable, the object-computer of authentication information that remote authentication center receives
System is after carrying out PCR16 metric extension to file using TPM chip, before being fed back, also utilizes TPM chip pair
The result of PCR16 metric extension is signed.Due to the ECC type in TPM chip signature key compared to RSA type signature
Key attack tolerant is stronger, encryption and decryption depth is fast, thus be proposed with ECC signature key to the result of PCR16 metric extension into
Row signature.Signed using the ECC private key in TPM chip to the result of PCR16 metric extension.
Correspondingly, whether remote authentication center, can complete using signature verification authentication information when carrying out security credential
It is whole reliable;If it is, judging whether authentication information matches with a reference value;If matching, it is determined that target computer system is in
Complete state;If mismatching, it is determined that target computer system is in non-secure states.Specifically, remote authentication center into
When row security credential, if signature verification does not pass through, show that authentication information has been tampered or has lacked, thus target calculates at this time
The safety certification of machine system fails.When the complete reliability of authentication information passes through, can by the value of the PCR16 in authentication information with
Benchmark is compared, if the value of PCR16 is identical as a reference value, shows file all in DMFL and is not tampered with, this
When target computer system be safe.If the value of PCR16 and a reference value be not identical, it is determined that target computer system is not
Safety.
Preferably, when determining that target computer system is dangerous, object-computer is determined using authentication information
Unsafe listed files information in system.Specifically, being the benchmark of the cryptographic Hash of more each file and each file one by one
Value, is which file is tampered to find bottom.In this way, the file being tampered can be apparent from, guarantee target is calculated
The safety of machine system has directive significance.
Using method provided by the embodiment of the present invention, safe condition is sent to the target computer system of operating status and is asked
It asks;Receive the authentication information of target computer system feedback;Wherein, authentication information is that target computer system carries out dynamic measurement
It obtains afterwards;Using the safety of authentication information verifying target computer system, security certification result is obtained.In view of needing
When determining whether target computer system is safe, if target computer system itself is dangerous, target computer system is mentioned
The safe condition of confession should also be as being insecure, thus safe condition should not voluntarily be determined by target computer system.It is based on
This sends safe condition request to target computer system when target computer system is in operating status.Object-computer
After the safe condition request that system receives, dynamic measurement is carried out, and will carry out including the authentication information of dynamic measurement result anti-
Feedback.After receiving authentication information, the safety of authentication information verifying target computer system can be utilized.As it can be seen that the party
Method can carry out effective safety verification to object-computer, further can ensure that target meter when target computer system is run
Calculation machine system is reliable and secure under operation.
Better understand the provided safety certifying method of the embodiment of the present invention for the ease of those skilled in the art, below with
In conjunction with specific safety certification process, which is described in detail.
Referring to FIG. 3, Fig. 3 is a kind of another specific flow chart of safety certifying method in the embodiment of the present invention.Remotely
Authentication center carries out the detailed process of safety certification to node (with target computer system above) is certified, comprising:
(such as reach the safety certification period when needing and obtaining and be certified the safe condition of node or receive safety certification and ask
When asking), remote authentication center hair requests to be certified node to this from safe condition;
Be certified node receive safe condition request when, read local disk storage DMFL dynamic measurement listed files,
And Hash calculation is carried out to file one by one, and expand in the PCR16 of TPM chip;
Be certified after all DMFL dynamic measurement listed files have been calculated in node, obtain filename-cryptographic Hash and
Then PCR16 metric extension value signs to PCR 16 using the ECC private key of TPM chip, obtains Signature
(PCR16), it finally returns to and gives remote authentication center;
After remote authentication center receives safe condition return information, using what is stored in Node_info database
Pub_Ecc public key (obtains PCR16 with Pub_Ecc decrypted signature value, and transmits together to Signature (PCR16) sign test
The original PCR16 metric to come over is identical, then shows that sign test passes through).If sign test passes through, show that data transmission procedure transmits
Identity is to be certified node, into next step;Otherwise, exportable warning message is certified node identity information verification failure,
It is then log out identifying procedure;
The verification of remote authentication center is certified after node identity information passes through, and PCR16 metric extension value is parsed, with benchmark
PCR16 a reference value in the Node_ref of Value Data library compares, if identical show that the system for being certified node is safe.It is no
Then being certified on node has file integrality to be destroyed, and can enter next step lookup and determine that the integrality of which file is broken
It is bad;
Remote authentication center parses filename-cryptographic Hash in the DMFL for being certified node return, while from a reference value number
" filename-Documents Metric a reference value " is obtained according in the Node_ref of library, the cryptographic Hash and a reference value of comparison document, find out not one by one
It is identical, can judge as which file it is imperfect caused by be certified node system be unsafe.
It is based on by remote authentication center using dynamic measurement technology (measuring the integrality of file under operation)
The mode of ECC signature verifies the safe condition for being certified node.By being certified Node registry mechanism (seeing above description),
The relevant public key of identity is transferred to remote authentication center, and the identity private key for being certified node is stored into TPM chip, has very high
Safety.
Embodiment two:
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of safety certification devices, are described below
Safety certification device can correspond to each other reference with above-described safety certifying method.
Shown in Figure 4, which comprises the following modules:
Safe condition request sending module 101 is asked for sending safe condition to the target computer system of operating status
It asks;
Authentication information receiving module 102, for receiving the authentication information of target computer system feedback;Wherein, certification letter
Breath is to obtain after target computer system carries out dynamic measurement;
Security authentication module 103 obtains safety and recognizes for the safety using authentication information verifying target computer system
Demonstrate,prove result.
Using device provided by the embodiment of the present invention, safe condition is sent to the target computer system of operating status and is asked
It asks;Receive the authentication information of target computer system feedback;Wherein, authentication information is that target computer system carries out dynamic measurement
It obtains afterwards;Using the safety of authentication information verifying target computer system, security certification result is obtained.In view of needing
When determining whether target computer system is safe, if target computer system itself is dangerous, target computer system is mentioned
The safe condition of confession should also be as being insecure, thus safe condition should not voluntarily be determined by target computer system.It is based on
This sends safe condition request to target computer system when target computer system is in operating status.Object-computer
After the safe condition request that system receives, dynamic measurement is carried out, and will carry out including the authentication information of dynamic measurement result anti-
Feedback.After receiving authentication information, the safety of authentication information verifying target computer system can be utilized.As it can be seen that the dress
Effective safety verification can be carried out to object-computer, further can ensure that target meter when target computer system is run by setting
Calculation machine system is reliable and secure under operation.
In a kind of specific embodiment of the invention, security authentication module 103, comprising:
Complete reliability demonstration unit, for whether complete reliable using signature verification authentication information;
Safety certification judging unit, if for authentication information be it is complete reliable, judge authentication information and a reference value
Whether match;
Safe condition determination unit, if being matched for authentication information with a reference value, it is determined that target computer system is in
Complete state;
Non-secure states determination unit, if being mismatched for authentication information and a reference value, it is determined that target computer system
In non-secure states.
In a kind of specific embodiment of the invention, non-secure states determination unit, specifically for determining target meter
Calculation machine system is in after non-secure states, determines unsafe listed files in target computer system using authentication information
Information.
In a kind of specific embodiment of the invention, further includes: registration module, based in the target to operating status
Before calculation machine system sends safe condition request, the safety certification registration request of target computer system is received, and recognize safety
Card registration request carries out EK public key and encrypted public key that parsing obtains TPM chip in target computer system;Store EK public key and
Encrypted public key, and request is collected to a reference value that target computer system sends dynamic measurement listed files;Receive and store mesh
Mark a reference value of computer system feedback.
It should be noted that since the device is the device for carrying out safety certification to target computer system, thus
When safety certification, computer system is needed to carry out dynamic measurement, and feeds back authentication information to the device.Specifically, target calculates
Machine system carries out dynamic measurement, comprising: target computer system is using dynamic measurement technology in dynamic measurement listed files
File carries out integrity measurement;PCR16 metric extension is carried out to file using TPM chip.Preferably, TPM chip pair is being utilized
After file carries out PCR16 metric extension, before being fed back, further includes: using TPM chip to PCR16 metric extension
As a result it signs.Preferably, target computer system is using the ECC private key in TPM chip to the result of PCR16 metric extension
It signs.
Embodiment three:
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of safety certificate equipments, are described below
A kind of safety certificate equipment can correspond to each other reference with a kind of above-described safety certifying method.
Shown in Figure 5, which includes:
Memory D1, for storing computer program;
Processor D2, when for executing computer program the step of the safety certifying method of realization above method embodiment.
Specifically, referring to FIG. 6, Fig. 6 be a kind of concrete structure schematic diagram of safety certificate equipment provided in this embodiment,
The safety certificate equipment can generate bigger difference because configuration or performance are different, may include one or more processing
Device (central processing units, CPU) 322 (for example, one or more processors) and memory 332, one
(such as one or more mass memories of storage medium 330 of a or more than one storage application program 342 or data 344
Equipment).Wherein, memory 332 and storage medium 330 can be of short duration storage or persistent storage.It is stored in storage medium 330
Program may include one or more modules (diagram does not mark), and each module may include in data processing equipment
Series of instructions operation.Further, central processing unit 322 can be set to communicate with storage medium 330, in safety certification
The series of instructions operation in storage medium 330 is executed in equipment 301.
Safety certificate equipment 301 can also include one or more power supplys 326, one or more wired or nothings
Wired network interface 350, one or more input/output interfaces 358, and/or, one or more operating systems 341.
For example, Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Step in safety certifying method as described above can be realized by the structure of safety certificate equipment.
Example IV:
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of readable storage medium storing program for executing, are described below
A kind of readable storage medium storing program for executing can correspond to each other reference with a kind of above-described safety certifying method.
A kind of readable storage medium storing program for executing is stored with computer program on readable storage medium storing program for executing, and computer program is held by processor
The step of safety certifying method of above method embodiment is realized when row.
The readable storage medium storing program for executing be specifically as follows USB flash disk, mobile hard disk, read-only memory (Read-Only Memory,
ROM), the various program storage generations such as random access memory (Random Access Memory, RAM), magnetic or disk
The readable storage medium storing program for executing of code.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond the scope of this invention.
Claims (10)
1. a kind of safety certifying method characterized by comprising
Safe condition request is sent to the target computer system of operating status;
Receive the authentication information of the target computer system feedback;Wherein, the authentication information is the target computer
It is obtained after system progress dynamic measurement;
The safety of the target computer system is verified using the authentication information, obtains security certification result.
2. safety certifying method according to claim 1, which is characterized in that described using described in authentication information verifying
The safety of target computer system, comprising:
It is whether complete reliable using authentication information described in signature verification;
If it is, judging whether the authentication information matches with a reference value;
If matching, it is determined that the target computer system is in complete state;
If mismatching, it is determined that the target computer system is in non-secure states.
3. safety certifying method according to claim 2, which is characterized in that determining that the target computer system is in
After non-secure states, further includes:
Unsafe listed files information in the target computer system is determined using the authentication information.
4. safety certifying method according to any one of claims 1 to 3, which is characterized in that the target computer system
Carry out dynamic measurement, comprising:
The target computer system carries out integrality degree to the file in dynamic measurement listed files using dynamic measurement technology
Amount;
PCR16 metric extension is carried out to the file using TPM chip.
5. safety certifying method according to claim 4, which is characterized in that utilize TPM chip to the file described
After carrying out PCR16 metric extension, before being fed back, further includes:
It is signed using result of the TPM chip to the PCR16 metric extension.
6. safety certifying method according to claim 5, which is characterized in that described to utilize the TPM chip to described
The result of PCR16 metric extension is signed, comprising:
It is signed using result of the ECC private key in the TPM chip to the PCR16 metric extension.
7. safety certifying method according to claim 1, which is characterized in that in the object-computer to operating status
System is sent before safe condition request, further includes:
The safety certification registration request of the target computer system is received, and the safety certification registration request is parsed
Obtain the EK public key and encrypted public key of TPM chip in the target computer system;
The EK public key and the encrypted public key are stored, and sends dynamic measurement listed files to the target computer system
A reference value collects request;
Receive and store a reference value of the target computer system feedback.
8. a kind of safety certification device characterized by comprising
Safe condition request sending module, for sending safe condition request to the target computer system of operating status;
Authentication information receiving module, for receiving the authentication information of the target computer system feedback;Wherein, the certification letter
It ceases after the target computer system carries out dynamic measurement and obtains;
Security authentication module obtains safety for verifying the safety of the target computer system using the authentication information
Authentication result.
9. a kind of safety certificate equipment characterized by comprising
Memory, for storing computer program;
Processor, realizing the safety certifying method as described in any one of claim 1 to 7 when for executing the computer program
Step.
10. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter on the readable storage medium storing program for executing
It is realized when calculation machine program is executed by processor as described in any one of claim 1 to 7 the step of safety certifying method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910463833.4A CN110188530A (en) | 2019-05-30 | 2019-05-30 | A kind of safety certifying method, device, equipment and readable storage medium storing program for executing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910463833.4A CN110188530A (en) | 2019-05-30 | 2019-05-30 | A kind of safety certifying method, device, equipment and readable storage medium storing program for executing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110188530A true CN110188530A (en) | 2019-08-30 |
Family
ID=67719007
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910463833.4A Pending CN110188530A (en) | 2019-05-30 | 2019-05-30 | A kind of safety certifying method, device, equipment and readable storage medium storing program for executing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110188530A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112182589A (en) * | 2020-10-29 | 2021-01-05 | 中国南方电网有限责任公司 | Industrial control host security defense system, method, computer equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080046752A1 (en) * | 2006-08-09 | 2008-02-21 | Stefan Berger | Method, system, and program product for remotely attesting to a state of a computer system |
CN101226577A (en) * | 2008-01-28 | 2008-07-23 | 南京大学 | Method for protecting microkernel OS integrality based on reliable hardware and virtual machine |
CN102436566A (en) * | 2012-01-12 | 2012-05-02 | 冶金自动化研究设计院 | Dynamic trusted measurement method and safe embedded system |
CN103916246A (en) * | 2014-03-31 | 2014-07-09 | 中国科学院软件研究所 | Method and system for preventing cheating during examination based on trusted computing |
CN105324779A (en) * | 2013-04-15 | 2016-02-10 | 亚马逊技术有限公司 | Host recovery using a secure store |
US20160070929A1 (en) * | 2013-06-07 | 2016-03-10 | Amazon Technologies, Inc. | Trusted computing host |
CN105608386A (en) * | 2016-03-11 | 2016-05-25 | 成都三零嘉微电子有限公司 | Trusted computing terminal integrity measuring and proving method and device |
-
2019
- 2019-05-30 CN CN201910463833.4A patent/CN110188530A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080046752A1 (en) * | 2006-08-09 | 2008-02-21 | Stefan Berger | Method, system, and program product for remotely attesting to a state of a computer system |
CN101226577A (en) * | 2008-01-28 | 2008-07-23 | 南京大学 | Method for protecting microkernel OS integrality based on reliable hardware and virtual machine |
CN102436566A (en) * | 2012-01-12 | 2012-05-02 | 冶金自动化研究设计院 | Dynamic trusted measurement method and safe embedded system |
CN105324779A (en) * | 2013-04-15 | 2016-02-10 | 亚马逊技术有限公司 | Host recovery using a secure store |
US20160070929A1 (en) * | 2013-06-07 | 2016-03-10 | Amazon Technologies, Inc. | Trusted computing host |
CN103916246A (en) * | 2014-03-31 | 2014-07-09 | 中国科学院软件研究所 | Method and system for preventing cheating during examination based on trusted computing |
CN105608386A (en) * | 2016-03-11 | 2016-05-25 | 成都三零嘉微电子有限公司 | Trusted computing terminal integrity measuring and proving method and device |
Non-Patent Citations (2)
Title |
---|
杨蓓 等: ""基于可信计算的动态完整性度量模型"", 《计算机工程》 * |
王勇 等: ""基于TPM2.0的内核完整性度量框架"", 《计算机工程》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112182589A (en) * | 2020-10-29 | 2021-01-05 | 中国南方电网有限责任公司 | Industrial control host security defense system, method, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109313690B (en) | Self-contained encrypted boot policy verification | |
US10176330B2 (en) | Global platform health management | |
US8127146B2 (en) | Transparent trust validation of an unknown platform | |
US9405912B2 (en) | Hardware rooted attestation | |
US10885197B2 (en) | Merging multiple compute nodes with trusted platform modules utilizing authentication protocol with active trusted platform module provisioning | |
US8667263B2 (en) | System and method for measuring staleness of attestation during booting between a first and second device by generating a first and second time and calculating a difference between the first and second time to measure the staleness | |
US10771264B2 (en) | Securing firmware | |
US8880667B2 (en) | Self regulation of the subject of attestation | |
CN110874494B (en) | Method, device and system for processing password operation and method for constructing measurement trust chain | |
CN107133520B (en) | Credibility measuring method and device for cloud computing platform | |
CN113014539B (en) | Internet of things equipment safety protection system and method | |
CN105227319A (en) | A kind of method of authentication server and device | |
US11604881B2 (en) | Verification of a provisioned state of a platform | |
US10057254B2 (en) | Mobile terminal for providing one time password and operating method thereof | |
CN113014444B (en) | Internet of things equipment production test system and safety protection method | |
CN107480535A (en) | The reliable hardware layer design method and device of a kind of two-way server | |
CN112511306A (en) | Safe operation environment construction method based on mixed trust model | |
KR20180046593A (en) | Internet of things device firmware update system for firmware signature verification and security key management | |
CN101908115B (en) | Method for realizing software trusted execution based on trusted platform module | |
Dave et al. | Care: Lightweight attack resilient secure boot architecture with onboard recovery for risc-v based soc | |
Dave et al. | Sracare: Secure remote attestation with code authentication and resilience engine | |
CN110188530A (en) | A kind of safety certifying method, device, equipment and readable storage medium storing program for executing | |
CN114547656A (en) | Intel SGX-based two-stage remote certification method in cloud environment | |
CN111723379A (en) | Trusted protection method, system, equipment and storage medium for trusted platform zone intelligent terminal | |
CN116305092B (en) | Method and system for realizing trusted virtualization system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190830 |
|
RJ01 | Rejection of invention patent application after publication |